Penetration testing with findings validated by hand.
Pentest is about finding what a real attacker would find — and proving impact. Our engagements combine industry-standard tools with proprietary scripts and, most importantly, line-by-line manual validation.
What's included
The scope below is the default for a typical engagement. Everything is adjustable during scoping, at no cost.
- Web applications (SPA, SSR, PHP, .NET, Java, Node)
- REST, GraphQL and gRPC APIs
- Mobile apps (Android & iOS)
- Internal & external networks
- Corporate Wi-Fi
- On-premises infrastructure
- Injections (SQLi, NoSQLi, LDAP, template)
- Authn / Authz / IDOR / escalation
- SSRF, XXE, deserialization
- Business logic flaws
- XSS, CSRF, impactful clickjacking
- Crypto and token failures
Modalities
adjustable to scopeBlack Box
No prior information. Simulates the opportunistic external attacker. Ideal to measure public exposure.
Grey Box
Common user access + partial documentation. Best cost-benefit for SaaS applications.
White Box
Access to code, architecture and various credentials. Maximum coverage and finding density.
How we conduct it
[pipeline]Reconnaissance
OSINT, DNS enumeration, stack fingerprinting, leaked credential collection and surface mapping.
Exploitation
Tests with industry-standard tools + proprietary scripts. Every finding is manually validated — zero scanner noise.
Post-Exploitation
Impact demonstration in controlled environment: escalation, pivot and sensitive data capture per scope.
Report & Retest
Technical + executive deliverables, calculated CVSS, PoC, prioritized recommendations. Retest included after fix.
Deliverables
dual view · NDAFrequently asked
2 to 4 weeks for standard engagements. Very large applications or those with multiple profiles may extend to 6 weeks. Detailed timeline comes at scoping.
We operate with windows, scopes and rules of engagement agreed in writing. Destructive actions only happen with explicit authorization. The rule is zero operational impact.
Yes. It's common to concentrate effort in critical areas (payment, auth, admin) instead of scanning everything superficially. Scope is designed together.
Yes. Accepted by ISO, SOC 2, PCI audits, M&A investors and risk committees — comes with declared methodology and signed evidence.
¿Listo para descubrir tus fallas?
La primera call de scoping es gratuita y cubierta por NDA. En 48 horas recibes propuesta técnica, alcance y cronograma. Sin formularios burocráticos.